-
# Architecture
This document outlines the architecture of the AI Nutrition-Pro application, including system context, containers, and deployment views. The architecture is depicted using C4 diagram…
-
I am concerned about data privacy and security with this Google Docs add-on. Can someone please outline the privacy / data security of this add on? I want to add this add-on to personal and some work …
-
https://www.hipaajournal.com/rhysida-franklin-county-kansas-ransomware-attack/
-
# User stories
## User can run `fabric` withing Github issues
As a GitHub user, I want to be able to use a GitHub action to leverage a large language model (LLM) from the [fabric](https://github…
-
We need to start dividing up the work, authoring the various Threats / Controls. We'll use this issue to manage that work and their assignments.
Each threat / control is 'ticked' when assigned to …
-
What is the bug?
I only have access to security-auditlog-* indices in Select Index/Aliases in Configure logs scan (Threat Intelligence)
How can one reproduce the bug?
Steps to reproduce the behav…
-
Hi,
I am about to do my bachelor's thesis in computer science and I was wondering if the following feature is good enough for a pull request (as long as I implement it perfectly)
My goal is to enh…
-
# Description
Cloudflare Email Security monitors email traffic for various threats including phishing, malware and spam. It provides protection by intercepting and quarantining potentially malicious e…
-
**Objective:** Investigate and enhance the availability, access controls, and tracking mechanisms for Passport XYZ's data dumps to ensure security, accountability, and efficiency.
### Key Areas to …
-
**Kibana version:**
8.15.1
**Elasticsearch version:**
8.15.1
**Server OS version:**
Windows 2019
**Browser version:**
Latest MS Edge
**Browser OS version:**
Latest MS Edge
**Original install method (e…